If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Can't run execute and exploits with Metasploit

Hi,
I have learnt about Metasploit recently through their website and on this forum. I have read loads of documentation but I can’t find out why the exploits won’t work...well to be more exact it looks like it is running the exploit but not executing the payload. I am not using my own exploits; I am using the built ones. Here is an example:
I run Metapsploit on my Back Track 4 live DVD.
The exploits I have used are the ones that are apparently still vulnerable like browser ones.
I used:
windows/browser/realplayer_console
windows/browser/ani_loadimage_chunksize
as well as other universal ones.

I have now resorted to the absolute basics just to test whether it is successful. With each different exploit I try I choose to deliver the payload “windows/exec”. The command I choose to execute is just a simple IPconfig to a text file and drop it in the C drive on the target PC (ipconfig > c:\meta.txt).
These exploits all exploit the browser so it sets up a fake http service which I then connect to using different browsers from the target machine. As soon as the target machine connects I see a message from the metasploit console (or metasploit gui) saying it is sending the exploit to the machine. From what I understand this means the exploit is actually working but not delivering the payload?
Some info about the target machine:
XP Pro SP3
Windows firewall disabled.
NOD32 anti virus but this is disabled for testing (when it was enabled it detected every exploit attempt).

No matter what payload I run it never works. There is no text file on the C drive.
Maybe these exploits don’t work anymore but I thought that if the console says it has sent the exploit then it does work?
Can anyone help please and point me in the right direction.
I am wondering whether there is something obvious I have missed.
Thanks,

Removed the bold from your post, we can read quite well without it thanks.

As to your question, why don't you read some of the links referenced in those exploits you are using. The notices for the associated vulnerabilities are there, and they will let you know which particular software versions are vulnerable.

If you read my post again you will see that my questions wasn't whether the exploit will work with certain browsers, I was asking whether the exploit is working when the console says it has sent the exploit or does this simply mean it has sent the exploit but it doesn't mean it has been successful?

I see what you mean now though by reading the links you sent about it only working on certain browsers and OS's. I already knew to check this but I thought when you chose the "Automatic" option this meant it was universal. I tihnk this is where i went wrong so thanks for this.

Sorry about the bold text, I copied and pasted from Word, didn't notice it was in bold.

Also When I run the Metasploit gui and go to set up the ANI_loadimage exploit one of the options is Fireforx on Windows XP. This meets the criteria for my test machine but the payload doesn't execute?

thanks Dave.
But I thought this was all automated through the fake http service?
I can't see how this exploit is useful if the victim must manually execute the file.
When running the exploit Metasploit tells me it has dumped a random exe name to the %temp% folder. How would the victim execute this if it is not automated? I find it hard to believe that anyone would go into the %temp% folder and run an exe. Am I missing something?

thanks Dave.
But I thought this was all automated through the fake http service?
I can't see how this exploit is useful if the victim must manually execute the file.
When running the exploit Metasploit tells me it has dumped a random exe name to the %temp% folder. How would the victim execute this if it is not automated? I find it hard to believe that anyone would go into the %temp% folder and run an exe. Am I missing something?

One of the ways in which the victim opens the ani file is by visiting a malicious web site, in this case the http service run by Metasploit. The ani exploit won't work on XP SP3 however, which is what I was getting at in my previous post. When Metasploit says it is sending the exploit it just means that it is sending the exploit to the remote system, it doesn't mean that it has worked.

Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".